Attribute-based encryption scheme supporting attribute revocation in cloud storage environment
Attribute-based encryption (ABE) scheme is widely used in the cloud storage due to its fine-grained access control.Each attribute in ABE may be shared by multiple users at the same time.Therefore,how to achieve attribute-level user revocation is currently facing an important challenge.Through resear...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2019-05-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2019116/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539343307505664 |
---|---|
author | Lei SUN Zhiyuan ZHAO Jianhua WANG Zhiqiang ZHU |
author_facet | Lei SUN Zhiyuan ZHAO Jianhua WANG Zhiqiang ZHU |
author_sort | Lei SUN |
collection | DOAJ |
description | Attribute-based encryption (ABE) scheme is widely used in the cloud storage due to its fine-grained access control.Each attribute in ABE may be shared by multiple users at the same time.Therefore,how to achieve attribute-level user revocation is currently facing an important challenge.Through research,it has been found that some attribute-level user revocation schemes currently can’t resist the collusion attack between the revoked user and the existing user.To solve this problem,an attribute-based encryption scheme that supported the immediate attribute revocation was proposed.The scheme could achieve attribute-level user revocation and could effectively resist collusion attacks between the revoked users and the existing users.At the same time,this scheme outsourced complex decryption calculations to cloud service providers with powerful computing ability,which reduced the computational burden of the data user.The scheme was proved secure based on computational Diffie-Hellman assumption in the standard model.Finally,the functionality and efficiency of the proposed scheme were analyzed and verified.The experimental results show that the proposed scheme can safely implement attribute-level user revocation and has the ability to quickly decrypt,which greatly improves the system efficiency. |
format | Article |
id | doaj-art-49232ffae23a4b1eaf7c6d3f6339d83f |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2019-05-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-49232ffae23a4b1eaf7c6d3f6339d83f2025-01-14T07:16:53ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2019-05-0140475659726935Attribute-based encryption scheme supporting attribute revocation in cloud storage environmentLei SUNZhiyuan ZHAOJianhua WANGZhiqiang ZHUAttribute-based encryption (ABE) scheme is widely used in the cloud storage due to its fine-grained access control.Each attribute in ABE may be shared by multiple users at the same time.Therefore,how to achieve attribute-level user revocation is currently facing an important challenge.Through research,it has been found that some attribute-level user revocation schemes currently can’t resist the collusion attack between the revoked user and the existing user.To solve this problem,an attribute-based encryption scheme that supported the immediate attribute revocation was proposed.The scheme could achieve attribute-level user revocation and could effectively resist collusion attacks between the revoked users and the existing users.At the same time,this scheme outsourced complex decryption calculations to cloud service providers with powerful computing ability,which reduced the computational burden of the data user.The scheme was proved secure based on computational Diffie-Hellman assumption in the standard model.Finally,the functionality and efficiency of the proposed scheme were analyzed and verified.The experimental results show that the proposed scheme can safely implement attribute-level user revocation and has the ability to quickly decrypt,which greatly improves the system efficiency.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2019116/cloud storageattribute-based encryptioncollusion attackattribute revocationoutsourced decryption |
spellingShingle | Lei SUN Zhiyuan ZHAO Jianhua WANG Zhiqiang ZHU Attribute-based encryption scheme supporting attribute revocation in cloud storage environment Tongxin xuebao cloud storage attribute-based encryption collusion attack attribute revocation outsourced decryption |
title | Attribute-based encryption scheme supporting attribute revocation in cloud storage environment |
title_full | Attribute-based encryption scheme supporting attribute revocation in cloud storage environment |
title_fullStr | Attribute-based encryption scheme supporting attribute revocation in cloud storage environment |
title_full_unstemmed | Attribute-based encryption scheme supporting attribute revocation in cloud storage environment |
title_short | Attribute-based encryption scheme supporting attribute revocation in cloud storage environment |
title_sort | attribute based encryption scheme supporting attribute revocation in cloud storage environment |
topic | cloud storage attribute-based encryption collusion attack attribute revocation outsourced decryption |
url | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2019116/ |
work_keys_str_mv | AT leisun attributebasedencryptionschemesupportingattributerevocationincloudstorageenvironment AT zhiyuanzhao attributebasedencryptionschemesupportingattributerevocationincloudstorageenvironment AT jianhuawang attributebasedencryptionschemesupportingattributerevocationincloudstorageenvironment AT zhiqiangzhu attributebasedencryptionschemesupportingattributerevocationincloudstorageenvironment |